article thumbnail

Technology Short Take #49

Scott Lowe

I highly recommend you read the entire post, but in short the five skills Matt recommends are software skills (which includes configuration management and software development tools like Git ), Linux, deep protocol knowledge, hypervisor and container networking, and IPv6. What does this mean? You’re welcome.

Vmware 60
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

Furthermore, if the operating system pattern is Linux Oracle Enterprise, the architect would use that pattern first in its design unless technical constraints made the consumption of this pattern suboptimal to accomplish the solution’s goal.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Before entering the land of Big Data, Alex spent the better part of ten years wrangling Linux server farms and writing Perl as a contractor to the Department of Defense and Department of Justice. Steve was previously CTO of Sanctum, a pioneer in Web application security testing and firewall software. He likes shiny objects.

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Before entering the land of Big Data, Alex spent the better part of ten years wrangling Linux server farms and writing Perl as a contractor to the Department of Defense and Department of Justice. Steve was previously CTO of Sanctum, a pioneer in Web application security testing and firewall software. He likes shiny objects.

article thumbnail

Technology Short Take 139

Scott Lowe

In this post , Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Linux malware is getting more sophisticated. ” Get ready to get nerdy! Servers/Hardware. Aye aye, Popeye!

Vmware 60
article thumbnail

Domains of Cybersecurity : A Brief Overview | Hacking into Cybersecurity

Linux Academy

Think about all the controls we have in place on our networks today: firewalls, authentication systems, intrusion detection and prevention systems (network- and host-based), router and switch security, operating system security, data encryption — the list goes on and on. It’s in this domain that we lump the following: Firewalls.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

This episode looks at how fuzz testing has evolved over the years, how open source projects have for the most part gone untested over time, and how new efforts to match fuzzing to software development are today helping to discover dangerous new vulnerabilities before they become the next Shellshock. But it’s actually from Eric S.